Security Advice For Using Video Conference Tools

Cyber security experts are warning people that the video meeting programs we now rely on might not be as secure as some might think. “Zoom bombing” is becoming a trend where people who are not supposed to be able to access Zoom meetings are getting in anyway.  The experts say that people using the program should double check their privacy settings, and shouldn’t post the link to zoom meetings on public forums unless necessary. 

Telecommuting and home-based learning is the new normal and people around the world are using video meetings and its essential that you know how to use video conferencing tools safely. 

In Singapore more than half a million students will be on home-based learning and even more adults will use video meeting working from home.One day after the start of the home-based learning period on April 8 the Singapore Ministry of Education announced that it was suspending Zoom following one incident in which hackers hijacked some students’ Zoom stream and showed pornographic content.

Similar “Zoom bombing” incidents have been reported around the world. In the wake of this and other privacy and cyber security concerns. Zoom has improved some of its security features and meeting controls. So what should users take note of to prevent themselves from becoming victims of harassment, privacy loss and eavesdropping when using video conferencing tools ?

Five Top Tips

  • It is vital to use the latest version of the software so that the bugs of the past would have been removed or fixed.
  • Remember that companies such as Zoom collect personal data such as name, email address, phone number, job title and even employer, as well as the IP address and device being used. Furthermore, if users sign in using Facebook, information will be collected from the Facebook profile. To retain some privacy, avoid using Facebook to sign in. 
  • Do not share your meeting link on public forums or on social media as this makes it easier for unauthorised persons to gain access to your meeting.
  • Familiarise yourself with your platform’s features and settings so as to be secure and protect your virtual space. For instance, Zoom has a “Waiting Room” feature that enables the host to manage the people who join and leave the meeting. Using this feature will enhance your security when hosting a meeting.
  • Users should refrain from using one’s Personal Meeting ID (PMI) to host events for the public. One’s PMI is a personal virtual meeting space that should not be open to others, except for close and trusted colleagues or users.

While using their video cameras during a Zoom session, users who want to increase the privacy level and prevent others from seeing the details of their physical background or surroundings can activate the virtual background feature such as a scene from the beach. You can choose to switch off your camera, if the video feature is not required.  

As a host of meetings or conferences, you can take extra precautions. For example, you should retain control of the screen.
Before and during a meeting, you can restrict the ability to screen share, so as to prevent others from sharing undesirable content or snatching control of your screen.

  • Additional security measures include setting up a two-factor authentication. Users can then only get access if they have the randomly generated meeting ID and a password. This enhances the level of security and limited access.
  • Another approach is to only enable signed-in or pre-invited users to join in the meeting.
  • You can “lock the meeting”. This Zoom feature allows the host to prevent others from joining the meeting. In this way, those with the meeting ID and password also cannot enter this virtual meeting room, once it is “locked”.     
  • To increase security and control as a host, you can exercise the option to remove disruptive and undesirable participants from the meeting.
  • You can  put the participants on hold and temporarily disable their video and audio connections to reduce noise and prevent interference.  

Such features will be useful for educators when they are using video-conferencing tools with an excited or vocal group of students.

Besides Zoom, there are other video-conferencing options such as Skype, though it has a limit of a maximum of 50 users per session. Users might also consider using  more secure platforms for business, like Google Meet and Facetime. Microsoft Teams is another free and popular video-conferencing platform with file and screen sharing features, capable of hosting up to 250 participants in a meeting.

Microsoft Teams and Google Meet require users to have accounts with them, whereas Zoom allows users to participate using their web browsers.  

Another leading provider is Cisco Webex, which offers a secure video-conferencing platform that does not require participants to have a Webex account to join the online meetings. Its free version can host up to 100 participants, with a range of features including a white board function and no time limit for meetings.  

Ultimately, each video-conferencing option has its strengths and limitations and the onus is on users to examine the security features carefully and use them effectively. Companies offering video-conferencing tools should highlight to users their security features and make a number of these features the default standard mode of use.

Parents and teachers could also educate their young to be aware of the importance of cyber security and to apply security measures when they are online. Cyber security is an essential life skill to protect us from online dangers and viruses, as we work and learn at home, while we fight the Covid-19 pandemic.

Today Online:     Today Online:       ABC News:      Technical.ly Baltimore:

You Might Also Read:

Hackers Are Exploiting Remote Workers:

 

« Quantum Computing, Hackers & The Internet of Things
Addressing Cyber Threats With Positive Action »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Help Net Security

Help Net Security

Help Net Security has been a prime resource for information security news and insight since 1998.

CipherPoint Software

CipherPoint Software

CipherPoint Software provides data-centric auditing and protection solutions for securing unstructured information

Zertificon Solutions

Zertificon Solutions

Zertificon is a leader in professional email encryption and data security.

CyberScout

CyberScout

Cyberscout delivers the latest cybersecurity education, protection and resolutions services. We also provide swift incident response services around the world.

Conscia

Conscia

Conscia provides IT infrastructure solutions and 24/7 services in network, data center, security and mobility.

Nubo Software

Nubo Software

Nubo’s Virtual Mobile Infrastructure creates a virtual corporate device on your employee smartphones and tablets. Enable unlimited mobility without leaving any data at risk.

Red Canary

Red Canary

Red Canary continuously monitors and analyzes your endpoints, users, and network activity in search of threatening behaviors, patterns, and signatures.

Information and Communication Technology Authority (ICT Authority) - Kenya

Information and Communication Technology Authority (ICT Authority) - Kenya

The ICT Authority is responsible for enforcing ICT standards in Government and ensuring information security.

TUV Rheinland Group

TUV Rheinland Group

TUV Rheinland Group is a testing services company with nearly 145 years of technological experience. We help you to protect your systems comprehensively, proactively and permanently.

Salviol Global Analytics

Salviol Global Analytics

Salviol Global Analytics is a leading provider of Fraud, Risk and Operational Performance Solutions to a number of vertical markets including Insurance, Banking, Utilities, Telco’s and Government.

Vesta

Vesta

Vesta Corporation is a global provider of a scalable suite of fraud and payment solutions for online commerce.

Billington CyberSecurity

Billington CyberSecurity

Billington CyberSecurity is a leading, independent education company with an exclusive focus on cybersecurity.

Wickr

Wickr

Wickr's mission is to secure the world's most critical communications. Wickr provides the highest standard of encryption trusted by millions worldwide.

Entara

Entara

Entara (formerly YJT Solutions) is an eXtended Service Provider (XSP) focused on providing cutting edge technology and cyber security solutions to companies in regulated industries.

Dynamic Networks

Dynamic Networks

Dynamic Networks provide Managed Cloud Services; Unified Communications; Security & Compliance Services and Network & Infrastructure Services for both Public Sector and Private sector businesses.

CloudDefense.AI

CloudDefense.AI

CloudDefense.AI is an industry-leading multi-layered Cloud Native Application and Protection Platform (CNAPP) that safeguards your cloud infrastructure and cloud-native apps,